Another helpful mode of the Tamper data extension is to graph the output of the page load data.
Tamper Data扩展有一种有用的模式,将页面装载数据的输出绘制成图形。
Attackers use network technology, illegally intrude computer system, steal information, tamper data, and bring heavy losses to enterprises.
攻击者利用网络技术,非法入侵他人计算机系统,窃取信息、篡改数据,给企业造成巨大损失。
The Tamper Data extension for Firefox (see the Resources section for a link) logs all the requests made by the Web browser and displays the time each took to download.
用于Firefox浏览器的Tamper Data扩展(参见参考资料一节中的链接)可以在日志中记录Web浏览器发出的每个请求,并显示每个请求所用的下载时间。
Transport security ensures that no one can tamper with the data being sent to a client or data received from a client.
传输安全确保了没有人可以篡改服务端发到客户端或者从客户端接收的数据。
If it's possible to tamper with the authentication device, such data capture should not be all that difficult.
如果有可能篡改认证设备,则获取这样的数据并不会很困难。
If an attacker can tamper with the authentication hardware, it might be possible to inject falsified digital data directly into the device.
如果攻击者可以篡改认证硬件,则可能将伪造的数字数据直接发射到设备中。
Applied results demonstrate that this method has highly sensitive to intentional tampering and outstanding detection performance for data tamper detection.
应用结果表明,该检测方法对非法篡改具有高度敏感性和优秀的数据篡改检测性能。
Beyond inspection and analysis, Fiddler also offers the ability to set breakpoints and tamper with data in requests and responses, especially useful for security and input sanitation testing.
除了数据监察和统计分析,Fiddler也支持设置断点,修改请求和响应的数据。这一点在安全性和数据正确性的测试上非常有用。
However, it is superior to hidden inputs and QueryStrings, since it can accept more data types and the content has been encoded into a single string and therefore is not easy to tamper with.
然而它又比隐藏输入和QueryString高级,这是因为它可以接受更多的数据类型以及它的内容被编译成一个单独的字符串从而不容易被任意更改。
WebSphere CloudBurst is able to encrypt all data, and stores sensitive data, such as passwords and credentials, on encrypted flash memory inside the tamper-resistant vault.
WebSphereCloudBurst能够加密所有数据并在抗外力入侵的库内在加密的闪存上存储密码和凭证之类的敏感数据。
It also features built-in tamper detection to prevent data from being extracted.
它还具有内置的篡改检测来防止数据被提取。
Thee product provides standard vehicle tracking data, including journey start and end, interval reports, speed, direction and distance, plus tamper alerting to indicate if the unit has been removed.
该产品可以提供标准的车辆追踪数据,包括旅程开始和结束点,间隔报告,速度,方向和距离,如果该装置被移除防篡改报警便会响起。
Moreover, the interaction of the tamper and ground was studied by comparing the calculated values with experimental data obtained on the collapsible loess site.
同时利用工程实测数据,对湿陷性黄土地基上夯锤与土体的共同作用进行了研究。
While many historical material itself authenticity resembles, nobody can guarantee the micro data not tamper with the composition, 'GIGO effect "(input waste, an example is output waste)."
而很多历史资料本身真伪难辨,谁也不能保证那些微观资料中没有篡改成分,‘GIGO效应’(输入废物,输出废物)便是一例。
A tamper-evident seal protects against image or data alteration, and users can add holograms, barcodes, microtext, and other security elements.
一个显窃启密封可以防止图像或数据被篡改,且用户可以添加全息图,条形码,微文字和其他安全要素。
This thesis further studies the security of data preservation from different angles such as the anti-counterfeiting, anti-tamper, anti-leakage and anti-repudiation.
在数据保全技术的安全性分析方面,则从防伪造、防篡改、防泄露、防抵赖等各个角度来进行了深入的剖析。
This thesis further studies the security of data preservation from different angles such as the anti-counterfeiting, anti-tamper, anti-leakage and anti-repudiation.
在数据保全技术的安全性分析方面,则从防伪造、防篡改、防泄露、防抵赖等各个角度来进行了深入的剖析。
应用推荐